To download the PDF version of the CFP, click here.
The international conference on Advanced Communication Systems and Information Security (ACOSIS 2016) is a forum for scientists, engineers, and practitioners to present their latest research results, ideas, developments, and applications in all areas of communication systems and information security.
ACOSIS has been organized for the last six years, and that is in the form the workshops. The first edition which has been organized at ENSAM-Meknes in 2010, the edition of 2011 in ENSIAS-Rabat, 2012 edition in FSO-Oujda, 2013's edition was held at EST-Meknes and in 2014 in FS-El Jadida.
In this edition ACOSIS switches to the conference size that will be organized in Marrakesh on October 17-19, 2016.
Topics of interest include, but are not limited to:
Channel characterization, estimation, and modeling |
Signal processing for wireless communications |
Modulation, multi-carrier modulation, OFDM |
Space-time coding, beamforming, MIMO |
Diversity, equalization |
Coding, and Decoding Algorithms |
Distributed coding, Network Coding |
Turbo-codes, Iterative Processing |
Information theory |
Interference management, alignment, and cancellation |
Energy efficient PHY layer design, energy harvesting |
RF circuits for wireless communications |
PHY layer design for wireless communication systems |
Cooperative and multihop relay communications |
Free space optics, radio over fiber |
mmWave and visible light communications |
Cognitive radio, spectrum sensing |
5G paradigm, cloud |
Vehicular communications |
Green communications |
Broadband communications |
Machine-to-Machine communications |
RFID networks and protocols |
Ad hoc, mesh and Wireless sensor networks |
IP multimedia subsystems (IMS) |
Wireless network security and privacy |
PHY layer security |
Security in grid, pervasive computing |
Authentication and authorization |
Key Exchange, Storage and Protection |
Malware and attack detection and prevention techniques |
Security, privacy and confidenciality in cloud networking |
Secure cryptographic protocols for advanced communication systems |
Security, privacy, and trust in wireless communications |
Security, privacy, and trust in social networks |
Miscellaneous Security, privacy, and trust issues |
Information hiding and watermarking |
Authors are invited to submit papers of original material that isn't currently under review in any other conference or journal.
Submission should be written in english with a maximum paper length of 10 printed pages, standard IEEE 2-columns format.
Standard IEEE Transactions templates for Microsoft Word or LaTeX formats can be found at:
http://www.ieee.org/ conferences_events/ conferences/publishing/templates.html.
The authors whose papers are accepted for a Poster session are invited to download the Poster Layout here.
Paper submission should be processed via EDAS platform, via the link: https://edas.info/newPaper.php?c=22304.
All submitted papers will be reviewed by experts in the fields based on the criteria of originality, significance, quality and clarity.
Accepted and presented papers will be submitted for inclusion in IEEE Xplore. They will also be submitted to SCOPUS, ISI, DBLP and other leading indexing services.
Papers of a particular merit may be recommended for a special issue in an international journal. Best Papers awards and prizes will be given too.